Decrypting an Image Using Mount Image Pro

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *

Already have an account? Sign In »

35 minutes
Video Transcription
All right. Welcome to handling bit Locker and fire. All file vault to encrypted drives with elementary and mount image Pro. That's gonna be a lot of fun.
I'm gonna show you some difficult ways in future courses, but
for now, we're gonna keep it slow, slow and simple. Fast and simple, maybe. Um, all right. So moving right along. I promise you would go ahead and decrypt these things, and I like to keep my promises.
So next up here we have Mount image Pro produced by get data out of Australia. Nice company. They also have a tool called forensic explore, which my good friend, blazer, cats, and
CEO of ah, of cats and forensics told me, Does a a far better job parsing out the MF T records and any other tool we'd ever seen. So and Blazer
Laser spends a lot of time looking at tools. I'll trust him on that one. I have not used a recent version of their forensic explore, but I have heard good things about it, and I intend to make sure we do a course on that. In the future,
you're gonna need to get version seven plus so 7.1, I think some 0.12 or something. Like, as is the current seven version of Mount Image Pro. Um
so Dr Shatz down there at the bottom, the guy behind the ever Metreon and one of the authors of FF four has been good to be working with the folks that get data to incorporate FF for recognition of the forensic images directly into their tool.
Eso You can just go directly from image to mounting.
We noticed. In the latest version, there's a little bit of a ah
problem with the handling of FF four images of bit locker encrypted images I've already reached out to, ah to get data sent in support tickets that in, you know, all the technical stuff, things like that. I'm sure they'll have it. Uh, probably fixed before this course makes it online. But
but just in case I'm going to show you the slight work around that will have to do here. Teoh, Go ahead, decrypt a, uh,
a bit locker encrypted image, but you know it will be working. Has full support for FF images and a PFS images all integrated into one. Um, for Mac using foul ball to all you news. That admin password. And for a windows bit locker volume, all you need is the 48 digit recovery password for that
good looking picture, Bradley. Right. He's looking very official there.
All right. Before we go into the summary, why don't we go ahead and do what I promised you? Which is we would
go ahead and decrypt these images some of pop over here to my mount image. Pro A. So you can see I'm using the about image Pro version 7.12 18 70 build here. And I'm just gonna momentarily switch some hard drives around
disk images available to me.
All right.
Yea, Sai buri disk.
You that kind of like it when that works?
All right, I'm in on this disc, we have the easier zehr one tag that we just made. I also have a pre made ah Mac book and and windows 10 encrypted images here. So we're gonna go ahead and use those because I have the keys. Andy,
so let's let's start with the Mac image. We come right up here to the corner, we say mount and we're going to mount an image file.
We're going to select the location for that. We're gonna use our cyber drive here,
and I'm going to take this Mac book
a f f four disc and say, Open it. You notice on the pull down here, it's got tons of different image types. It it automatically recognizes V H. D is just just every kind of crazy thing you could ever want to possibly mount here is all supported by this tool. Really nice. Um,
you know, and the default up here is a whole bunch of these common image types that you have to do, So
it's gonna immediately recognize your images from your discs.
I see Okay to that in a pause. A second. And it's gonna offer me to mount that as a disc Orica mounted as a file system, I'm gonna go ahead and say file system. Um, I could say, Mac,
my father system options there have options for including unallocated space, deleted files, all that sort of stuff. So I'm gonna go ahead and leave those loans, say Sure, why not? And then I'm going to say, OK,
it's gonna process here for a second, and then it's going to say, Hey, what is your credentials? Your password for this encrypted bill, Uh, pit like fall of all encrypted volume that were detected here. So I'm gonna go ahead and put my password in there, which is really cool,
and it's going to go ahead and continue to progress along here.
We have noticed it that oftentimes it will ask for the password multiple times. So not really a big problem.
Give it the password again.
Um, I'm assuming it has to do with the virtual ization of the A p FS file system. That's just a wild, wild guess on my part. But I like to think that I'm right. So we're gonna go with that
and it'll continue doing its its peace here mounting along,
um, one of the things that we have noticed they can cause your problem here If you're running a really aggressive anti virus or anti malware endpoint program on the computer that you're trying to mount these images with,
we have found that it will significantly slow up the reading of the images, so you might want to, you know, temporally disable that or something as your as your loading up
one of these. These images for reviewers, A disk or something like that?
I don't If you noticed on the screen, there were loading. This actually loads it up in a read only format. So you're not gonna damage anything? Ah, on the file systems, You're perusing it. You know the amount image.
Give it another second here to finish out what it's doing,
all right.
you can see it mounted up. It created e drive for me. So if I go ahead and click on view,
I have
if a four here
partitions available pre brute recovery v EMS, all that did in the larger F one partition here. Roots. Who didn't expect that
with the hair. Riggio.
That's what I was looking for. Sorry, it took me a moment to get there, but, ah, cut the whole file system there. So we could we go into that, open that up, or I could pop over here to my Windows Explorer. And since it is mounted as a as an actual drive, I can click my way into that
going that entitled data their route.
And of course, I have my
whole Mac file system here. There's my ADF folder
bash, profiles, histories, files, folders, things like this. So again, Ah, love my
all the contents of my encrypted follow vault to drive now available to me so I could go ahead and, you know, run further processes on this, or I could, you know, extract files. Or I could use some other forensics tool on it. Things like that all available to me. Now.
My other option was I could have amounted. This is a diskette. Could have made a
another snapshot unencrypted version of this. Ah, of the data volume here really depends on what your next forensic step is. And last thing I'm gonna do is go ahead and amount. All so that was pretty darn simple. Not much to that. Um,
and boom. You know, immediately, an A P fs file system that was fully encrypted
is available to you for reviewer. Further processing
nice and easy. I'm running this from a Windows computer. Didn't have to do anything fancy to get to that. Um, you know, really, really straightforward. I guess I should have mentioned the price tag on this. A fully licensed version of Mount Image crow runs Ah, $299. So So, A very reasonably priced program to
All right, So our next item up is the bit locker to encrypted This I get told you a little bit of a work around here. So for some reason, right now, in this this version of Mount Image Pro 712 there seems to be a problem with the handling of the FF four file. We noticed up
it would start to read it,
work on it for a long period of time and then eventually break and failed to open it.
Eso, uh, our work around for this because it's a friends, a guy you gotta have lots of work arounds or ladies. I know a lot of fine forensic ladies out there to working hard at this. Um, so we do instead, is we're gonna go ahead and use the elementary bridge that we've used in previous courses.
Uh, go ahead and mount. Are
our disc here with our
our bit locker encrypted image in it. So, in this case, we have the Mac book image in there.
We've got theirs. Are Windows 10 image as the one that we want to get to.
And of course, it should pick up the
It's indexing everything.
Index index index index
Let her finish out. There's the easier one tag one that we made. So go ahead, amount up All that and what the bridge is gonna do. Of course we talked about before is make all those, uh, f of four images available as raw D D images. So what will be able to do is, say, Mt.
Mountain image file and in this case will go to the ever Petrie repository R D Dr will select our Windows 10 Bit Lockard image. And as you see here, they said, it's gonna take that ff four and it's gonna make it a raw D d image does. It says it's 476 gig now because it's a
good 500 Seagate disk
and we're gonna say open.
Ah, same thing here this time. We're gonna go ahead and mounted as a disc, though, because we want our Windows file system to go ahead and recognize this is a bit locker and volume
us. We'll see. OK,
get a little bit of
messing around there,
and he knows we have any notice here, says Unlocked Dr E. So I go to Dr E and it says, What is your bit locker? 48 bit digital recovery key. Oh, my goodness. So much key. Let me give you grab my key here, which, of course, I have locked up.
All right, so I have my key available here, and I can go ahead and type it in. So 517365886
All right, so I get all 48 digits in there. That was fun, right? And we go ahead and say unlock. And if everything went right by, ah, by E Dr Shows up as a completely unencrypted disk now, and, uh
and we're good to go. So that was Ah, Windows seven computer. It says, um, that we had previously acquired. So now all of my images and so air of my items are all available there and going to program falls or whatever I want. And everything is available to me in an unencrypted state
again, you know, it's a disk. So I could go ahead and require the data volume separately. I could process it from here. I could do whatever I wanted, depending on what my forensic requirements were for that
Up Next